FORUMS

What Do You Think About Fingerprint Scanners?

More and more phones are featuring fingerprint scanners, and with many promising … more

What’s Next for Samsung and Its Flagships?

If we were to say that the Galaxy S6 was a leap of faith made by Samsung, we … more

The Ultimate Showcase of dBrand Skins

In the search for ways to protect, accessorize, and personalize; a user has many options. One … more

Huawei’s Rapid Rise to Third Place in the Smartphone Race

Huawei has quickly grown to become one of the world’s biggest … more

Crazy as idea...use our old devices for shared computation

204 posts
Thanks Meter: 188
 
By sokrboot, Senior Member on 19th August 2014, 12:12 PM
Post Reply Subscribe to Thread Email Thread
Guys and Gals, we have been struggling with unlocking the S4 Bootloader for well over a year. I stay current with where our progress is. I'm not a developer and i know this is a crazy suggestion but what have we got to lose?

Why don't we pool our old devices and use OpenCL (or similar) to tap into our phone GPUs and try a targeted attack on our bootloader? Yes, I know, I know it will take a billion years for a million supercomputers to brute force the SHA1 key. But headway has been made in the last year in finding ways to target attacks on SHA1. I'm not saying it will be easy...it won't. Hell, I don't even know how to get started but that's why I bring the request to you guys. I have 2 or 3 old devices....we all do. Plus if we continue this then every year each of us is adding a device to the computational network.

I know there will be many "nay-sayers" so don't post with negativity. If you are interested and want to contribute then post and let me know.
@Surge1223 @joshuabg @ryanbg @NighthawkXL @RuggedHunter @SamuriHL
The Following 2 Users Say Thank You to sokrboot For This Useful Post: [ View ]
 
 
19th August 2014, 01:45 PM |#2  
Hashbang173's Avatar
Recognized Contributor
Thanks Meter: 1,241
 
Donate to Me
More
I like the idea but this could take a very long time, but there is a chance that one of the first keys we gen is the right key. And why exactly did you mention me?

Sent from my OtterX running AICP using Tapatalk
19th August 2014, 02:13 PM |#3  
SamuriHL's Avatar
Senior Member
Thanks Meter: 1,880
 
More
Why utilize under powered devices?

http://www.infosecurity-magazine.com...-amazon-cloud/

I'm going to bow out, though, as I'd only be one of the naysayers on this.
19th August 2014, 02:47 PM |#4  
sokrboot's Avatar
OP Senior Member
Thanks Meter: 188
 
More
Quote:
Originally Posted by joshuabg

I like the idea but this could take a very long time, but there is a chance that one of the first keys we gen is the right key. And why exactly did you mention me?

Sent from my OtterX running AICP using Tapatalk

Because you keep up with the threads on our bootloader, so I figured you would have some interest.
19th August 2014, 03:06 PM |#5  
sokrboot's Avatar
OP Senior Member
Thanks Meter: 188
 
More
Quote:
Originally Posted by SamuriHL

Why utilize under powered devices?

http://www.infosecurity-magazine.com...-amazon-cloud/

I'm going to bow out, though, as I'd only be one of the naysayers on this.

Because they are free. Our community doesnt have a good track record for paying for research and development to benefit themselves directly, much less benefit the greater good. I didn't post to claim I have THE answer...I posted with a crazy ass idea which I hoped would spark some ingenuity in others. Anyway, thanks for the link and thanks for being honest.
19th August 2014, 04:31 PM |#6  
Senior Member
Thanks Meter: 1,146
 
More
Hash Collisions

Finding a hash collision isn't like bruteforcing a password. It's (very basically) finding another file that has the same hash. It's not so much guessing the 'password' as it is hoping that mathematical computation outputs the same hash as another file, by sheer chance. There are academic and private researchers who have been working on this for years, with exponentially more processing power and resources than we could ever hope to see. While I admire your will to find a solution, this won't be happening for us. Your efforts are more fruitful by calling Samsung/Verizon/AT&T and complaining, leaving feedback, and doing it relentlessly. I call/email/chat with Samsung and Verizon on a daily basis, leaving feedback and asking to have my bootloader unlocked. If enough fuss is made, they may come around. Verizon and AT&T are the main targets, I just call Samsung when Verizon gets sick of hearing me.

To put it into perspective, you have a greater chance of winning the powerball 100 times, and getting hit by lightning every time you go to collect your prize.
Last edited by ryanbg; 19th August 2014 at 04:35 PM.
The Following 5 Users Say Thank You to ryanbg For This Useful Post: [ View ]
19th August 2014, 08:47 PM |#7  
Even today's most basic quantum computers that are being developed could theoretically take years to crack SHA1 (when used properly), granted it could do it in much less time then any Von Neumann machine could do. But nonetheless it's unrealistic to use this as a method to crack encryption. You'd have a better chance getting the NSA to provide the info on backdoors they have (assuming the Snowden leaks are true) that they have broken nearly all modern encryption by providing researchers with a flawed RNG.
Last edited by NighthawkXL; 20th August 2014 at 04:47 PM.
Post Reply Subscribe to Thread
Previous Thread Next Thread
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes